mirror of
https://github.com/lwfinger/rtl8188eu.git
synced 2025-05-09 14:53:05 +00:00
rtl8188eu: Remove cases of two or more blank lines
Signed-off-by: Larry Finger <Larry.Finger@lwfinger.net>
This commit is contained in:
parent
e91077579f
commit
bad0b4cde4
91 changed files with 1 additions and 1098 deletions
|
@ -69,7 +69,6 @@ static u8 WIFI_OFDMRATES[] = {
|
|||
IEEE80211_OFDM_RATE_54MB
|
||||
};
|
||||
|
||||
|
||||
int rtw_get_bit_value_from_ieee_value(u8 val)
|
||||
{
|
||||
unsigned char dot11_rate_table[] = {
|
||||
|
@ -157,7 +156,6 @@ u8 *rtw_set_ie
|
|||
|
||||
*frlen = *frlen + (len + 2);
|
||||
|
||||
|
||||
return pbuf + len + 2;
|
||||
}
|
||||
|
||||
|
@ -263,7 +261,6 @@ u8 *rtw_get_ie_ex(u8 *in_ie, uint in_len, u8 eid, u8 *oui, u8 oui_len, u8 *ie, u
|
|||
uint cnt;
|
||||
u8 *target_ie = NULL;
|
||||
|
||||
|
||||
if (ielen)
|
||||
*ielen = 0;
|
||||
|
||||
|
@ -340,7 +337,6 @@ exit:
|
|||
void rtw_set_supported_rate(u8 *SupportedRates, uint mode)
|
||||
{
|
||||
|
||||
|
||||
_rtw_memset(SupportedRates, 0, NDIS_802_11_LENGTH_RATES_EX);
|
||||
|
||||
switch (mode) {
|
||||
|
@ -386,8 +382,6 @@ int rtw_generate_ie(struct registry_priv *pregistrypriv)
|
|||
struct wlan_bssid_ex *pdev_network = &pregistrypriv->dev_network;
|
||||
u8 *ie = pdev_network->IEs;
|
||||
|
||||
|
||||
|
||||
/* timestamp will be inserted by hardware */
|
||||
sz += 8;
|
||||
ie += sz;
|
||||
|
@ -445,7 +439,6 @@ int rtw_generate_ie(struct registry_priv *pregistrypriv)
|
|||
if (rateLen > 8)
|
||||
ie = rtw_set_ie(ie, _EXT_SUPPORTEDRATES_IE_, (rateLen - 8), (pdev_network->SupportedRates + 8), &sz);
|
||||
|
||||
|
||||
return sz;
|
||||
}
|
||||
|
||||
|
@ -527,7 +520,6 @@ int rtw_get_wpa2_cipher_suite(u8 *s)
|
|||
return 0;
|
||||
}
|
||||
|
||||
|
||||
int rtw_parse_wpa_ie(u8 *wpa_ie, int wpa_ie_len, int *group_cipher, int *pairwise_cipher, int *is_8021x)
|
||||
{
|
||||
int i, ret = _SUCCESS;
|
||||
|
@ -540,7 +532,6 @@ int rtw_parse_wpa_ie(u8 *wpa_ie, int wpa_ie_len, int *group_cipher, int *pairwis
|
|||
return _FAIL;
|
||||
}
|
||||
|
||||
|
||||
if ((*wpa_ie != _WPA_IE_ID_) || (*(wpa_ie+1) != (u8)(wpa_ie_len - 2)) ||
|
||||
(_rtw_memcmp(wpa_ie+2, RTW_WPA_OUI_TYPE, WPA_SELECTOR_LEN) != true))
|
||||
return _FAIL;
|
||||
|
@ -550,7 +541,6 @@ int rtw_parse_wpa_ie(u8 *wpa_ie, int wpa_ie_len, int *group_cipher, int *pairwis
|
|||
pos += 8;
|
||||
left = wpa_ie_len - 8;
|
||||
|
||||
|
||||
/* group_cipher */
|
||||
if (left >= WPA_SELECTOR_LEN) {
|
||||
*group_cipher = rtw_get_wpa_cipher_suite(pos);
|
||||
|
@ -609,7 +599,6 @@ int rtw_parse_wpa2_ie(u8 *rsn_ie, int rsn_ie_len, int *group_cipher, int *pairwi
|
|||
return _FAIL;
|
||||
}
|
||||
|
||||
|
||||
if ((*rsn_ie != _WPA2_IE_ID_) || (*(rsn_ie+1) != (u8)(rsn_ie_len - 2)))
|
||||
return _FAIL;
|
||||
|
||||
|
@ -672,8 +661,6 @@ int rtw_get_sec_ie(u8 *in_ie, uint in_len, u8 *rsn_ie, u16 *rsn_len, u8 *wpa_ie,
|
|||
u8 wpa_oui[4] = {0x0, 0x50, 0xf2, 0x01};
|
||||
uint cnt;
|
||||
|
||||
|
||||
|
||||
/* Search required WPA or WPA2 IE and copy to sec_ie[] */
|
||||
|
||||
cnt = (_TIMESTAMP_ + _BEACON_ITERVAL_ + _CAPABILITY_);
|
||||
|
@ -726,8 +713,6 @@ int rtw_get_sec_ie(u8 *in_ie, uint in_len, u8 *rsn_ie, u16 *rsn_len, u8 *wpa_ie,
|
|||
}
|
||||
}
|
||||
|
||||
|
||||
|
||||
return *rsn_len + *wpa_len;
|
||||
}
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue